?
Solved

receiving audio files

Posted on 1997-05-26
1
Medium Priority
?
203 Views
Last Modified: 2010-04-12
When I am sent an e-mail with an audio file attached to it, for some reason I'm unable to play it - once, I clicked on the file and waited for nearly half an hour but nothing would happen. Recently, I sent out an e-mail with an audio file attached to it (I also "carbon-copied" the message). The person was able to receive the message and listen to the  file without any difficulty. When I tried to listen to my "carbon-copied" version of this exact same message, this bit of information came up - "Unknown extension on file c%7c\program%20files\netscape\navigator\mail\inbox".
I suppose my question is, what is it that I have to do in order to play these e-mailed audio files (downloading and playing regular audio files from different web sites has never been a problem). I use the Netscape Navigator 3 browser, 28.8 modem, a 166 computer with 16MB. Your help will be much appreciated. Thanks
0
Comment
Question by:bolts052697
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
tavkhelidzem earned 200 total points
ID: 1009167
One of the possible solutions is:
Click right mouse button on the link to the attached wav in mail message and choose "Save Link As...".
Save it somewhere and then play it with MediaPlayer.
Good luck!
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question